“Manage Access, Not Keys” with Tatu Ylönen (Podcast)

SSH CommunicationsGreetings SSH fans. Preston and I had the pleasure of speaking with SSH Communications Security founder Tatu Ylönen about keyless access and how system administrators and system security professionals should “manage access, not keys” when using the SSH protocol.

Preston and I debate the security of a decision to use passwordless and keyless access. During the call, we asked how to implement keyless access and what the deployment looks like to a system administrator. Preston and I are both system administrators, so we are definitely interested in the ins-and-outs of deployment.

Tatu YlönenAs always, Tatu is very engaging and extremely knowledgeable about the topic of security, SSH, and access management.

Podcast details:

Length: 15:52 minutes. Format: MP3. Rating: G for all audiences.

Copyright 2017 SecurityNOW. License: CC BY.

Black Hat 2017 Conference Trends with Richard Henderson (Podcast)

Black Hat 2017I’ve never been to a Black Hat Conference but I’d love to go. Richard Henderson, Global Security Strategist for Absolute and regular SecurityNOW podcast guest, is going. Before he left, he shared some ideas and trends for this year’s conference in fabulous Las Vegas.
Richard and I discuss a lot of different things in this episode but our main focus is Black Hat 2017 and what he thinks the trends are going to be.

I think this was a fun one. Unfortunately, Preston was not able to join us, but we had a good time anyway. Richard is always a great guest and I think you’ll enjoy hearing a longer, calmer podcast than usual.

Podcast details:

Length: 36:22 minutes. Format: MP3. Rating: G for all audiences.

Copyright SecurityNOW 2017. License: CC BY

Social Media Security with Proofpoint’s Dan Nadir (Podcast)

ProofpointPreston and I had the opportunity to speak with Proofpoint‘s Vice President of Digital Risk on the hot topic of social media security. I say it’s a hot topic because it’s a hot topic for me because I’m not really a fan of most social media sites. I generally only use LinkedIn and Twitter. But there’s more to social media than Facebook, Twitter, and LinkedIn. There’s Instagram, Snapchat, and others. And security for all them is a big concern–or should be. In this podcast, we discuss the problems with social media security and some possible solutions.

Listen in and tell us what you think.

Podcast details:

Length: 19:59 minutes. Format: MP3. Rating: G for all audiences.

Copyright 2017 SecurityNOW  Licensing: CCBY

SecurityNOW’s Mid-Year 2017 Cybersecurity Review

HalfPreston and I took a few minutes to recap the year so far in cybersecurity and to catch you up on what’s going on with breaches, security tips, and ransomware. We have a lengthy (for us) conversation that covers all things cybersecurity for the first half of 2017 and all that it had to offer. I want you to pay particular attention to my five rules concerning ransomware. Please take this advice as wisdom from not only Preston and myself but from other cybersecurity professionals as well.

Podcast details:

Length: 33:56 minutes. Format: MP3. Rating: G for all audiences.

True Digital SecurityThis podcast was sponsored by True Digital Security.

Ryan Benson of Exabeam discusses SIEM software

ExabeamPreston and I interviewed Ryan Benson, Senior Threat Researcher at Exabeam about Security Information and Event Management (SIEM) software. We discussed what SIEM software is, what it does for a company, how it protects your network, and how to evaluate a SIEM suite.

Preston and I also agree that a SIEM suite should offer more than simple log aggregation and log scraping. There are less expensive and less cumbersome tools that can handle that functionality if that’s all you need. We also agree that SIEM companies need to bake some intelligence into their products that allow them to be automated, to respond automatically to threats, and to include advanced analytics so that you can optionally find out what’s going on and going wrong on your network.

Ryan gives us some insight into what’s going on in SIEM software and why you should care. Before you purchase a SIEM solution, take his advice offered in the podcast.

Podcast details:

Length: 22:35 minutes. Format: MP3. Rating: G for all audiences.

Check out Exabeam’s SIEM Platform for yourself.

America Exposed – Who’s Watching You Through Your Computer’s Camera? Interview with ICIT’s James Scott (Podcast)

ICITPreston and I interviewed Senior Fellow, James Scott from the Institute for Critical Infrastructure Technology about the serious threat to individuals from their webcams. You might think that because your camera is in your house and turned off that your safe from prying eyes, but you’re not. James gives us some insight as to what the problem is and how to solve it.

The unsecured cameras on PCs and mobile devices pose a serious threat to the private sector, to individual users, and to national security.  No other exploit is as vicious or expedient with its results as camera activation malware which can be used by malicious threat actors to surveil and spy on unsuspecting users.

In our most recent publication, entitled “America Exposed:  Who’s Watching You Through Your Computer’s Camera?”, ICIT provides an in-depth analysis of this underreported threat by discussing:

  • The evolution of surveillance capabilities in computing devices
  • Examples of malware used by malicious actors to gain access to cameras and microphones
  • “Webcam Gate” and creepy gaming surveillance technology
  • Strategies on how to mitigate mass camera-based surveillance

Podcast details:

Length: 26:59 minutes. Format: MP3. Rating: G for all audiences.

You can download the paper here: http://icitech.org/icit-analysis-america-exposed-whos-watching-you-through-your-computers-camera/

Introducing True Digital Security and CEO and Founder Dr. Jerald Dawkins (Podcast and Video)

True Digital SecurityPreston and I had the pleasure of speaking with, Dr. Jerald “Jerry” Dawkins, the CEO and founder of True Digital Security, the premier local security company here in Tulsa, Oklahoma. For this one, I stayed behind the scenes (literally) and Preston took the solo spotlight for this rare interview with Dr. Dawkins. This podcast is actually the audio extract from the video (Coming soon) we captured during the interview. True Digital Security is headquartered in Tulsa but has offices in Tulsa and Oklahoma City and cover clients globally.

Jerry and Preston discuss passwords, compliance issues, security pain points, and how to engage True Digital Security for your corporate security needs. This is a special focus on a growing company of security experts who are ready to help you navigate HIPAA, PCI, FFIEC, NERC CIP, and your other corporate security requirements and needs.

I think you’ll agree that after listening to this interview that Dr. Dawkins and his team knows security. You’ll also agree that this discussion is far too short. We hope to have Jerry and other True Digital Security folks on the show in the future so that you can get to know the whole team.

Podcast details:

Length: 22:12 minutes. Format: MP3. Rating: G for all audiences.

Our video interview is up and ready and available above. You can meet some of the True Digital Security team in their spotlight video.

Copyright 2017 SecurityNOW. Licensed CC BY.